what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-05-30

linux-security.1-5.txt
Posted May 30, 2000
Authored by Benjamin Thomas, Dave Wreski | Site linuxsecurity.com

Linux Security Magazine May 29. In this issue - Articles: The Top 10 Security Risks, Intrusion Detection on Linux, Analyzing Future Computer Trends and Threats, Always-on Internet Security, Mini-FAQ: "antivirus software for Linux". New Advisories this week: FreeBSD process and krb5 vubnerabilities, TurboLinux gpm, SuSE gdm, Slackware fdmount, XFree86 Multiple distribution vulnerability, Red Hat Secure Web Server 3.0-3.2: mailmail, Qpopper Vulnerability, Mandrake 7 dump vulnerability, Mandrake xemacs vulnerability, Mandrake fdmount buffer overflow, Caldera buffer overflow in kdm, and Caldera DoS attack against X server.

tags | web, overflow
systems | linux, redhat, freebsd, suse, slackware, mandrake
SHA-256 | 7dfd070ef058e716f57228524f1de6980dc09e772cf2b571688d4489cf6a21e4
conflictd.tar.gz
Posted May 30, 2000
Authored by Noah | Site ccitt5.net

conflict-DoS.c and conflictd.c are tools which spoof arp packets to make an annoying popup message appear on the target windows machine. It is faster to close all the boxes than reboot. Tested on FreeBSD 4.0. Uses libnet.

tags | denial of service, spoof
systems | windows, freebsd
SHA-256 | 3052be4e41953d7b53d40912556f19985d90a258d2c2c9c779131052e107ad32
snuff-v0.8.1.tar.gz
Posted May 30, 2000
Authored by Noah | Site ns2.crw.se

Snuff is a packet sniffer for Linux 2.0/2.2 that can monitor many streams at once. It can also mail and wipe the log if reached a specified size.

Changes: No more crap in the sniff logs anymore - Checking the size of the ip & tcp header now. Added the keepopen parameter for the log file and fixed a y2k bug.
tags | tool, sniffer
systems | linux
SHA-256 | 20ada8083a2c773baff8cb842960c41146ad942dfe604084482ae24470262a29
ecrack-0.1.tgz
Posted May 30, 2000
Authored by Sean Trifero | Site innu.org

ECrack v0.1 - Energymech (StarGlider Class - IRC bot) brute force password cracker. Tested with emech-2.7.6 but should work with other versions also.

tags | cracker
SHA-256 | 965bcadb702864ba2de652dc0a30c9932d3974a698c74d705f69c326931d9e6e
hunt-1.5bin.tgz
Posted May 30, 2000
Authored by Pavel Krauz | Site cri.cz

Hunt (linux binary distribution) is a program for intruding into a tcp connection, watching it and resetting it. It can handle all connections it sees. Features: Connection Management - setting what connections you are interested in, detecting an ongoing connection (not only SYN started), Normal active hijacking with the detection of the ACK storm, ARP spoofed/Normal hijacking with the detection of successful ARP spoof, synchronization of the true client with the server after hijacking (so that the connection don't have to be reset), resetting connection, watching connection; Daemons - reset daemon for automatic connection resetting, arp spoof/relayer daemon for arp spoofing of hosts with the ability to relay all packets from spoofed hosts, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic with the ability to search for a particular string; Packet Engine - extensible packet engine for watching TCP, UDP, ICMP and ARP traffic, collecting TCP connections with sequence numbers and the ACK storm detection; Switched Environment - hosts on switched ports can be spoofed, sniffed and hijacked too; much, much more. Requires Linux 2.2, GlibC 2.1 with LinuxThreads, Ethernet.

Changes: Bug fix release - computation of packet checksum has been fixed, packet relaying for routers has been corrected, unprintable characters are printed in <hex> and printing of terminal control characters can be turned off.
tags | tool, udp, spoof, sniffer, tcp
systems | linux
SHA-256 | ac19041b44e008c04d61ff7f5b5814d6dca222360f7b72d642db09ae5b89b9b3
hunt-1.5.tgz
Posted May 30, 2000
Authored by Pavel Krauz | Site cri.cz

Hunt is a program for intruding into a tcp connection, watching it and resetting it. It can handle all connections it sees. Features: Connection Management - setting what connections you are interested in, detecting an ongoing connection (not only SYN started), Normal active hijacking with the detection of the ACK storm, ARP spoofed/Normal hijacking with the detection of successful ARP spoof, synchronization of the true client with the server after hijacking (so that the connection don't have to be reset), resetting connection, watching connection; Daemons - reset daemon for automatic connection resetting, arp spoof/relayer daemon for arp spoofing of hosts with the ability to relay all packets from spoofed hosts, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic with the ability to search for a particular string; Packet Engine - extensible packet engine for watching TCP, UDP, ICMP and ARP traffic, collecting TCP connections with sequence numbers and the ACK storm detection; Switched Environment - hosts on switched ports can be spoofed, sniffed and hijacked too; much, much more. Requires Linux 2.2, GlibC 2.1 with LinuxThreads, Ethernet.

Changes: Bug fix release - computation of packet checksum has been fixed, packet relaying for routers has been corrected, unprintable characters are printed in here.
tags | tool, udp, spoof, sniffer, tcp
systems | linux
SHA-256 | a8a1978f3bd05ca3f01c168c13c9a09b1e1e9038c14fdfe43694c07fe3a0e328
suse.kmulti.txt
Posted May 30, 2000

SuSE Security Announcement - A local security hole was discovered in the KDE CD player, kmulti here.

tags | local
systems | linux, suse
SHA-256 | 3d6e3eea20f253e2d757f141b870e0c57ded66217a446d1cc10dd0bab9e94906
wemilo.tcl
Posted May 30, 2000
Authored by r00tabega, Futant | Site r00tabega.com

Remote Cart32 exploit - Though L0pht released an advisory and patch for the well known Cart32 bug, this is the first exploit released to date. Allows remote command execution.

tags | exploit, remote
SHA-256 | b15ca1584e4ea0d26f2e39fd6253fdaeb6ec98bcc198aec4914a379e204b8f61
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close